Thursday, January 7, 2010

USB Crypt Stick - Design flaw, or...


...design back door discovered? 
You decide. 
NIST-certified USB Flash drives with hardware encryption cracked

Kingston, SanDisk and Verbatim all sell quite similar USB Flash drives with AES 256-bit hardware encryption that supposedly meet the highest security standards. This is emphasised by the FIPS 140-2 Level 2 certificate issued by the US National Institute of Standards and Technology (NIST), which validates the USB drives for use with sensitive government data. 

Security firm SySS, however, has found that despite this it is relatively easy to access the unencrypted data, even without the required password.

The USB drives in question encrypt the stored data via the practically uncrackable AES 256-bit hardware encryption system. Therefore, the main point of attack for accessing the plain text data stored on the drive is the password entry mechanism. When analysing the relevant Windows program, the SySS security experts found a rather blatant flaw that has quite obviously slipped through testers' nets. During a successful authorisation procedure the program will, irrespective of the password, always send the same character string to the drive after performing various crypto operations – and this is the case for all USB Flash drives of this type.

Cracking the drives is therefore quite simple. (more) (UPDATE)

Wednesday, January 6, 2010

"Don't tape and tell." - Burke's Law

MD - William Burke, a Pocomoke City resident who went on trial today on charges that he illegally recorded a heated conversation with his town's mayor, made a plea agreement and was sentenced to probation before judgment.

Burke entered an Alford plea this afternoon to a misdemeanor wiretapping charge, conceding that prosecutors had enough evidence to obtain a conviction without admitting guilt. He had originally been charged with a felony wiretapping crime.

A Circuit Court judge pronounced Burke guilty of a misdemeanor and sentenced him to probation, but did not hand down any jail time. (more) (Amos Burke) (hum-a-long)

The Year's Most-Hacked Software

At the beginning of this decade, Microsoft represented a cybercriminal's dream target: universally-used software, brimming with bugs ready to be exploited to hijack users' PCs. But as the software giant has slowly cleaned up its security flaws, hackers are looking toward another vendor whose products are nearly as ubiquitous and whose bounty of vulnerabilities are just being discovered: Adobe. (more)

Most Popular Software is Security Software

The number-one most downloaded software of all time on CNET’s Downloads.com website is from AVG Technologies — more than 1.5 million downloads every week and an astonishing 247 million downloads cumulatively since AVG was first offered at the site. (more) (free version)

Note: This is just for the Windows download section of the Web site.

While the Windows crowd is wringing their hands, the most popular software in the Mac section is fun stuff!

LimeWire lets users share and search for all types of computer files, including movies, pictures, games, and text documents. Other features include the ability to preview files while downloading, advanced techniques for locating rare files, and an extremely intuitive user interface. (Mac Section)

SpyCam Story #565 - FCC Crackdown

FCC Cracks Down on Illegal Wireless SpyCams. Nooo, not all spycams, just some wireless ones broadcasting on unapproved frequencies...
Federal Communications Commission DA 09-2623 January 6, 2010 SCS Enterprises Inc. d/b/a Spy Camera Specialists, Inc. Re: File No. EB-08-SE-142 Dear Mr. Lee: This is an official CITATION, issued to SCS Enterprises, Inc., d/b/a Spy Camera Specialists, Inc. (“Spy Camera”), pursuant to Section 503(b)(5) of the Communications Act of 1934, as amended (“Act”), for marketing unauthorized radio frequency devices in the United States in violation of Section 302(b) of the Act, and Sections 2.803 and 15.205(a) of the Commission’s Rules (“Rules”). As explained below, future violations of the Commission’s rules in this regard may subject your company to monetary forfeitures.

In March 2008, the Spectrum Enforcement Division of the Enforcement Bureau (“Division”) received a complaint alleging that Spy Camera was marketing unauthorized wireless video transmitters that operate in the 1.08, 1.12, 1.16 and 1.2 GHz bands. We initiated an investigation and on May 13, 2008, we sent a Letter of Inquiry (“LOI”) to Spy Camera.

In your June 9, 2008 response to our LOI, you admit marketing wireless video transmitters beginning in early 2006 on your web site, www.spycameras.com, to end users and resellers. You admit that these wireless video transmitters all operate on 1.2 GHz, which is a restricted frequency band under 15.205(a) of the Rules. You also state that you were surprised to learn that these devices could not be marketed in the United States, and upon receipt of our LOI, immediately returned all the 1.2 GHz transmitters in stock to your supplier and ceased. (more) One down, dozens to go.
Clients... Yes we regularly check these frequencies (and other off-beat frequencies) for wireless spycams when we conduct your inspections. ~Kevin

Karsten Nohl showed how easy it is to eavesdrop on GSM-based cell phones

This week brought some bad news for mobile phone users. German security expert Karsten Nohl showed how easy it is to eavesdrop on GSM-based (Global System for Mobile Communications) cell phones, including those used by AT&T and T-Mobile customers in the U.S.
Q: What does this mean for users of GSM phones? What is the real-world threat?
Nohl: Cell phone calls can be intercepted--not just since this week, but more cheaply every month. Sensitive information, say, from politicians, can be overheard from, say, foreign embassies. Others willing to cross the line into illegality and listen in on a call could be industry spies or even private snoops. (more)

Saturday, January 2, 2010

Where do pets go? GPS surveillance knows.


To track his wandering cat, Mark Spezio rigged up a cat collar with a lightweight GPS logger. Here's what he discovered about KooKoo's secret habits... (video)



Wednesday, December 30, 2009

Dude, ThinkGeek.com ...$22.99 (since 2008)

Japanese researchers said Monday they had developed a "hummingbird robot" that can flutter around freely in mid-air with rapid wing movements. 

The robot, a similar size to a real hummingbird, is equipped with a micro motor and four wings that can flap 30 times per second, said Hiroshi Liu, the researcher at Chiba University east of Tokyo.

"The next step is to make it hover to stay at one point in mid-air," Liu said, adding that he also plans to equip it with a micro camera by March 2011.

The robot, whose development cost has topped 200 million yen (2.1 million dollars), may be used to help rescue people trapped in destroyed buildings, search for criminals or even operate as a probe vehicle on Mars, he said. (more)

Meanwhile, over at ThinkGeek.com...
The Black Stealth features 3-channels, allowing it to go up and down, rotate right and left and move forwards and backwards. Unlike most of the small 2-Channel copters on the market which are always moving forward with somewhat twitchy controls, the Black Stealth is a breath of fresh air. You can actually fly it where you want it to go, it's fairly rugged... and surprisingly it's probably the easiest to fly small copter we've ever taken to the office airspace. (more) (video)

FutureWatch... FleaBots!
Tiny robots the size of a flea could one day be mass-produced, churned out in swarms and programmed for a variety of applications, such as surveillance, micromanufacturing, medicine, cleaning, and more... In the future, the researchers hope to move from building academic prototypes to manufacturing the robot on a commercial basis, which is necessary for overcoming some of the technical issues.

By mass-producing swarms of robots, the loss of some robotic units will be negligible in terms of cost, functionality, and time, yet still achieve a high level of performance. Currently, the researchers hope to find funding to reach these goals. (Ask Mr. Liu how he did it.) (more) (Future flea powder.)

SpyKids... The Cell Phone

from the AT&T Web site...
"AT&T FamilyMap provides peace of mind by being able to conveniently locate a family member from your wireless phone or PC and know that your family's information is secure and private. First 30 DAYS FREE! At the end of the free 30 days, you will automatically be subscribed and charged $9.99 per month thereafter to locate up to two family members or $14.99 per month thereafter to locate up to five family members unless you cancel service." (more)



GSM Cell Phone Encryption Code Broken


A German computer scientist has cracked the encryption algorithm that secures 80% of the world's mobile phones, but it's far from a practical attack.

Researcher Karsten Nohl, a former graduate student at the University of Virginia, revealed his decryption methods this week at the Chaos Communication Conference in Berlin, the largest hackers conference in Europe. Nohl and a team of two dozen other experts worked for five months to crack the security algorithm that protects Global System for Mobile communications.

To break the code, Nohl and the other researchers used networks of computers to crunch through the trillions of mathematical possibilities. The result was the development of a code book comprising 2 TB of data that's compiled into cracking tables. The tables can be used as a kind of reverse phone book to determine the encryption key used to secure a GSM mobile phone conversation or text message.

Before the latest hack, hundreds of thousands of dollars of computer equipment was needed to break the GSM code, mostly limiting hacking to government agencies. Nohl told the conference that someone with the code book could eavesdrop on GSM communications using about $30,000 worth of computer gear, making such illegal activity possible by many more criminal organizations. (more) (a5/1 Cracking Project)

Wednesday, December 23, 2009

Vulnerable VoIP Products Almost Triple Since 2006

VoIP Vulnerabilities, a white paper issued by McAfee Labs, found almost 60 vulnerabilities in voice over internet products, compared to just under 20 vulnerabilities in 2006.

"We can credit part of this increase to better tools for finding VoIP vulnerabilities, yet this upward trend should be largely attributed to the growing number of VoIP installations", the white paper said...

Eavesdropping on VoIP conversations is possible when the default implementation of the Real Time Protocol (RTP) used to carry VoIP traffic is not encrypted, for example. Tools such as VOMIT have been published to dump unencrypted traffic between phones and turn it into playable sound. (more)

Advice from McAffee on eavesdropping attacks... For a superior solution, you should use secure RTP (SRTP), which provides both encryption and authentication. (more)

Tuesday, December 22, 2009

McDonald's... "Over 4 Million Stolen"

Australia - Two men are being extradited to Perth to face charges of stealing more than $4 million from customers at fast food outlets in what police say is Australia's biggest-ever EFTPOS card skimming operation...

Officer-in-charge of the major fraud squad, Detective Senior Sergeant Don Heise, said the skimming occurred through September after the pin pads at the drive-thru counters of more than 20 McDonald's restaurants in the Perth metropolitan area were replaced with compromised machines.

The bogus keypad would then transmit the card's information to a nearby mobile or laptop.

The accounts of 4000 victims have been hacked into after the first withdrawal took place on October 5, with one suffering a loss of about $6000 to $7000.

During October, more than $4 million was stolen from bank accounts, using ATMs in NSW, Victoria, Canada, Great Britain, the USA, India and Malaysia. (more)

The device is the Ingenico PX328 pinpad, a decade-old terminal type, which is not tamper proof. Upgrade, if you got them! (more)

"Talk is over-rated as a means of settling disputes."


Tom Cruise is being sued for allegedly hiring a private investigator to illegally wiretap a magazine editor's phone, according to documents obtained by TMZ.com.

Michael Davis Sapir claims the movie star, along with attorney Bert Fields and jailed private investigator Anthony Pellicano, conspired to spy on him. (more) (more)


Monday, December 21, 2009

The One Minute TSCM Quiz

Our corporate clients are pretty smart. They learn quite a lot when they retain us. (They can ace this quiz.)

Think you know as much about TSCM and spybusting as they do?
Find out, take The One Minute TSCM Quiz.

If our quiz leaves you feeling up a pole, without a clue, you're not alone. Everyone starts that way.  Solution: Retain us in 2010.

Saturday, December 19, 2009

FutureWatch - Video Surveillance Predictions

It is really not too hard to predict the future of CCTV. 
The future is here...

2010 - The end of the "Video Wall"
"Clean and green," is coming to the security center Situational Awareness Center. Video analytics is the brain in the box catalyst of change. 

One human. One screen. One unblinking computer, watching every video feed; analyzing everything it sees and popping it onto the "Situational Awareness Officer's" screen (or internal projection node) only when deemed necessary.

Video analytics is smart. Facial recognition with file linking, movement interpretation, psychological action profiling, letter/number/bar code reading, RFID tag sensor incorporation, intelligent threat assessment, people/vehicle counting, congestion/loitering assessment, and more.

Not impressed yet?
Look at it from management's point of view...
• Lower hardware investment.
• Lower maintenance costs.
• Lower electric bill.
• Lower payroll.
(more)

Scalable Situational Awareness
The Port of Brisbane is turning itself into a 3D video game. Brian Lovell, project surveillance leader, explains...
"You could imagine a single desktop interface that gives you all the information you need at a port, like the Port of Brisbane," he said. "The reason to go single desktop is that is the modern trend. It also means you can provide that information to emergency responders so if there is an incident at the Port of Brisbane you can provide not just the video feed but all the context information to emergency providers like the police, etc.

"What we do is have all the video feeds, which are placed [superimposed] on a 3D texture map surface – sort of like a game of Doom or a video game environment. The beauty of that is you don't need to know the camera numbers or where they are positioned because it is implicit in the display. So if you go, for example, to the oil bunkering facility on the map you just scroll along with your mouse and then zoom in and if there is any video camera present you can see, live, what is happening at that spot. It is a little like Google Street View except when you go in you are seeing a live camera feed." (more)


Slip the Mouse a Mickey
We are rapidly approaching 3D video... no, I am not talking about the kind with the goofy red/green glasses. This 3D will be extremely useful to the person monitoring the "Situational Awareness Center" of the future. No mouse in this person's hand. A tilt of the head will move them around their semi-virtual world. Apple's latest patent clued me in...

"An electronic device for displaying three-dimensional objects, comprising control circuitry, a display and a sensing mechanism, the control circuitry operative to:direct the display to display a three-dimensional object;direct the sensing mechanism to detect the current position of the user; transform the object to appear to be viewed from the detected current position; anddirect the display to display the transformed object."  (this worthwhile video will give you the idea)

Some of these things are already here and the really cool stuff is coming soon. ~Kevin